Friday Five — February 14, 2025
OpenShift Official Blog
by
1d ago
Compiler - Rising with the Machines | AI 101Everyone’s talking about AI. Everyone says it’s the future. To find out where we’re going, we should know how we got here—and what we’re working with. Follow along with Compiler's season on AI, wherever you get your podcasts. Learn more News Observer - IBM is overhauling its core business through Raleigh’s reliable Red HatAt IBM’s Investor Day event in New York City, a word executives stressed was “software.” And two other words top IBM brass highlighted again and again were “Red Hat.” Learn more Migration toolkit for virtua ..read more
Visit website
Democratize security processes in your software development lifecycle
OpenShift Official Blog
by
1d ago
IT security is no longer the responsibility of a single, specialized team. To help protect your organization from growing cyber threats, IT security should be a priority for everyone. By integrating security processes and functions into every stage of the software development lifecycle, you not only better protect your products but you also build trust with your users. Here's how you can democratize security processes and make it a shared responsibility across your organization, while giving your developers what they need to create applications quickly.Software supply chain security tools and ..read more
Visit website
EPMS: the cornerstone of cybersecurity in defense operations
OpenShift Official Blog
by
1d ago
In a landscape where cyber threats evolve daily, the Defense Information Systems Agency’s (DISA) Enterprise Patch Management System (EPMS) plays a critical role in maintaining the cybersecurity of the Department of Defense (DoD). EPMS is not just a tool—it's a strategy, bridging software, efficiency and innovation to enhance the security posture of critical systems.The Importance of EPMSEPMS addresses a core cybersecurity challenge: verifying that all systems are consistently patched against known vulnerabilities. With cyber adversaries growing more sophisticated, leaving any endpoint exp ..read more
Visit website
10 Enterprise Linux myths debunked
OpenShift Official Blog
by
1d ago
Linux is over 30 years old, powering businesses all over the world, and yet there are still misconceptions about what it is and how it works. That’s understandable. After all, one reason Linux is special is because it is unique. It doesn’t always work the way other operating systems do, and that’s frankly a good thing. Here are 10 myths about Linux that are getting rather old, and that modern Linux has, quite simply, surpassed.Unstoppable Linux: 3 things Red Hat Enterprise Linux has kept for 30 years1. Myth: Enterprise Linux has a steep learning curveOrigins: When the sky’s the limit ..read more
Visit website
A toolkit for your toolkit: 7 learning resources to migrate to OpenShift Virtualization
OpenShift Official Blog
by
1d ago
Organizations around the world have been using virtual machines for decades, often staying with a single vendor because migrating those virtual machines (VMs) from one hypervisor to another can be such a monumental task. Red Hat’s migration toolkit for virtualization (MTV) facilitates the complex task of migrating VMs to Red Hat OpenShift Virtualization with tools that are easy to use, highly configurable and can be automated to handle even the largest environments.Here are 7 informative resources to learn how to migrate VMs to Red Hat OpenShift Virtualization with the toolkit:1. Introductio ..read more
Visit website
Empowering non-technical users to contribute knowledge and enhance model responses
OpenShift Official Blog
by
1d ago
In every release of our products, the User Experience Design team at Red Hat (UXD) prioritizes implementing work that directly relates to customer feedback and insights. For a nascent product like RHEL AI, we have had to be creative about doing so. Feedback channels we used for this upcoming release to help us continuously improve the experience include upstream community engagement and direct feedback from users via Slack, interviews with internal team members, interviews with AI users and enthusiasts who may be interested in adopting RHEL AI, and examining our competitive landscape. This has ..read more
Visit website
Introducing RHEL AI 1.4: Powering the Next Wave of Generative AI Innovation
OpenShift Official Blog
by
1d ago
The field of generative AI (gen AI) is evolving rapidly, and Red Hat Enterprise Linux AI (RHEL AI) is at the forefront of this transformation. RHEL AI 1.4 introduces support for a new, powerful Granite 3.1 model with multi-language support and a larger context window. The latest version also adds capabilities for evaluating customized and trained models with Document-Knowledge bench (DK-bench), a benchmark designed to measure the knowledge a model has acquired. Finally, we’re introducing the developer preview of our new graphical UI that helps to simplify data ingestion and writing InstructL ..read more
Visit website
Navigating an era of perpetual change: a fresh perspective for telecommunications
OpenShift Official Blog
by
1d ago
Every year, new innovations and emerging technologies bring us closer to a fully connected society. As the industry is hard at work to meet the demands of constant connectivity, telecommunications service providers face the challenge of standing out in a crowded market. They must navigate a surge of new solutions and technologies that promise lucrative opportunities, while balancing the need to reduce costs on existing services with the imperative to drive meaningful business outcomes by investing in innovative applications, technologies and services.In recently taking on the role of chief tec ..read more
Visit website
Unlocking the Effective Context Length: Benchmarking the Granite-3.1-8b Model
OpenShift Official Blog
by
1d ago
Large language models (LLMs) are evolving rapidly enabling applications such as chatbots, code generation, and knowledge extraction. One crucial factor influencing their effectiveness is the context length - the number of tokens a model can look at once. While theoretical context lengths continue to grow, the practical, effective context length (ECL) determines real-world usability.In this blog post, we will explore the ECL of the Granite-3.1-8b instruct model and validate its capabilities across various tasks. The study takes its inspiration from the paper "Measuring Effective Context Length ..read more
Visit website
Leading an effective Static Application Security Testing (SAST) program
OpenShift Official Blog
by
3d ago
The Secure Development Lifecycle (SDLC) is the process of applying a variety of security activities to software under development with the intent of producing robust and more reliable software. These activities are varied, and can be applied at different stages of the development lifecycle. One important activity is Static Application Security Testing (SAST), a testing methodology that analyzes source code of software to identify potential security issues. Typically, this process is conducted using specialized SAST tools and is often integrated into a continuous integration and continuous deli ..read more
Visit website

Follow OpenShift Official Blog on FeedSpot

Continue with Google
Continue with Apple
OR